Non-Stop Media fights against censorship by providing methods of circumvention to protect your data. Many tools exist which are designed to counteract controls over information and news. Visit this page (pending updates) for the most current and effective techniques, links to demonstration videos and written instructions.
- Virtual Private Network (VPN)
A VPN user is assured that his data will be unreadable if intercepted by a third party. It works by creating a virtual link between two physical networks in different locations. Only the users are allowed access and data sent through the private link (or tunnel) is encrypted.
- Anonymous Internet Use
Tails operating system allows a user anonymity and privacy on the Internet from almost anywhere and any computer. Unless explicitly set, the computer will not retain any traces of use. All files, emails and instant messaging are encrypted.
- Encrypt emails
To ensure confidentiality of emails and other information exchanged via Internet and reduce vulnerability to monitoring, identity theft and interception, users should consider the Thunderbird and PGP programs.
- Improve Your Internet Privacy and Security
Tor utilizes three random servers (relays) to improve Internet privacy and security. A user’s traffic is anonymized and encrypted through the virtual tunnels before transmission to public Internet.
- Protect Hidden Data (Metadata)
Users may eliminate or modify data that accompany their files. Image file formats and text processing files often contain details such as date, time and name of creator user may wish to protect.
- Mobile Phone Anonymity and Security
If a mobile phone is powered on, its user is vulnerable to tracking. Surveillance levels vary according to country, and the governments of different countries may collect information through telephone companies. In addition to tracking, the SIM and actual device maintain evidence of activities, browsing history, etc.